Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 11:31

General

  • Target

    ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe

  • Size

    3.8MB

  • MD5

    a4f21876ac5aec30d284a8bfb43f5400

  • SHA1

    3d11289529c98e0c14f99d6b06607ab10dead776

  • SHA256

    ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962

  • SHA512

    27fe2d69e57c1684eb7edc8c0c07092b0e72820d4195556a512752b1fc9864736f1943884f30a9e0dd629a170313aa1830c1d911562e3638eaebf7afec1fc27f

  • SSDEEP

    49152:3sCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98x:Q6XLq/qPPslzKx/dJg1ErmNg

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 4 IoCs
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe
    "C:\Users\Admin\AppData\Local\Temp\ea70763cc536f206af69005b5df0e7da9a622bb676a1fa3bc7a00151ced15962N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2148
    • \??\c:\nbnhtn.exe
      c:\nbnhtn.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 36
        3⤵
        • Program crash
        PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\nbnhtn.exe

    Filesize

    3.8MB

    MD5

    1bdf40f78e14fe87306429ab392ed2ba

    SHA1

    cffc9f3de2bf843661e9c38e7ea073b4c852a40b

    SHA256

    2cf5b5d36e0c7e86f1fb4a46840f561926c39c65411292bf3b6de7912e7ce722

    SHA512

    f9fa2c8dae44e50de087bedd2bc4d9c88f0cbbd032b9fc3d03345a65a42708fb1cfeb468c83561deed6edf6af1e9a6222230faba3afc9947c0c2b6e1b576ce54

  • memory/2148-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2148-6-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2376-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB